2 * Poly1305 authenticator algorithm, RFC7539, x64 AVX2 functions
4 * Copyright (C) 2015 Martin Willi
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
12 #include <linux/linkage.h>
14 .section .rodata.cst32.ANMASK, "aM", @progbits, 32
16 ANMASK: .octa 0x0000000003ffffff0000000003ffffff
17 .octa 0x0000000003ffffff0000000003ffffff
19 .section .rodata.cst32.ORMASK, "aM", @progbits, 32
21 ORMASK: .octa 0x00000000010000000000000001000000
22 .octa 0x00000000010000000000000001000000
86 ENTRY(poly1305_4block_avx2)
87 # %rdi: Accumulator h[5]
88 # %rsi: 64 byte input block m
89 # %rdx: Poly1305 key r[5]
90 # %rcx: Quadblock count
91 # %r8: Poly1305 derived key r^2 u[5], r^3 w[5], r^4 y[5],
93 # This four-block variant uses loop unrolled block processing. It
94 # requires 4 Poly1305 keys: r, r^2, r^3 and r^4:
95 # h = (h + m) * r => h = (h + m1) * r^4 + m2 * r^3 + m3 * r^2 + m4 * r
102 # combine r0,u0,w0,y0
105 vpunpcklqdq t1,ruwy0,ruwy0
109 vperm2i128 $0x20,t1,ruwy0,ruwy0
111 # combine r1,u1,w1,y1 and s1=r1*5,v1=u1*5,x1=w1*5,z1=y1*5
114 vpunpcklqdq t1,ruwy1,ruwy1
118 vperm2i128 $0x20,t1,ruwy1,ruwy1
119 vpslld $2,ruwy1,svxz1
120 vpaddd ruwy1,svxz1,svxz1
122 # combine r2,u2,w2,y2 and s2=r2*5,v2=u2*5,x2=w2*5,z2=y2*5
125 vpunpcklqdq t1,ruwy2,ruwy2
129 vperm2i128 $0x20,t1,ruwy2,ruwy2
130 vpslld $2,ruwy2,svxz2
131 vpaddd ruwy2,svxz2,svxz2
133 # combine r3,u3,w3,y3 and s3=r3*5,v3=u3*5,x3=w3*5,z3=y3*5
136 vpunpcklqdq t1,ruwy3,ruwy3
140 vperm2i128 $0x20,t1,ruwy3,ruwy3
141 vpslld $2,ruwy3,svxz3
142 vpaddd ruwy3,svxz3,svxz3
144 # combine r4,u4,w4,y4 and s4=r4*5,v4=u4*5,x4=w4*5,z4=y4*5
147 vpunpcklqdq t1,ruwy4,ruwy4
151 vperm2i128 $0x20,t1,ruwy4,ruwy4
152 vpslld $2,ruwy4,svxz4
153 vpaddd ruwy4,svxz4,svxz4
156 # hc0 = [m[48-51] & 0x3ffffff, m[32-35] & 0x3ffffff,
157 # m[16-19] & 0x3ffffff, m[ 0- 3] & 0x3ffffff + h0]
160 vpunpcklqdq t1,hc0,hc0
164 vperm2i128 $0x20,t1,hc0,hc0
165 vpand ANMASK(%rip),hc0,hc0
168 # hc1 = [(m[51-54] >> 2) & 0x3ffffff, (m[35-38] >> 2) & 0x3ffffff,
169 # (m[19-22] >> 2) & 0x3ffffff, (m[ 3- 6] >> 2) & 0x3ffffff + h1]
172 vpunpcklqdq t1,hc1,hc1
176 vperm2i128 $0x20,t1,hc1,hc1
178 vpand ANMASK(%rip),hc1,hc1
181 # hc2 = [(m[54-57] >> 4) & 0x3ffffff, (m[38-41] >> 4) & 0x3ffffff,
182 # (m[22-25] >> 4) & 0x3ffffff, (m[ 6- 9] >> 4) & 0x3ffffff + h2]
185 vpunpcklqdq t1,hc2,hc2
189 vperm2i128 $0x20,t1,hc2,hc2
191 vpand ANMASK(%rip),hc2,hc2
194 # hc3 = [(m[57-60] >> 6) & 0x3ffffff, (m[41-44] >> 6) & 0x3ffffff,
195 # (m[25-28] >> 6) & 0x3ffffff, (m[ 9-12] >> 6) & 0x3ffffff + h3]
198 vpunpcklqdq t1,hc3,hc3
202 vperm2i128 $0x20,t1,hc3,hc3
204 vpand ANMASK(%rip),hc3,hc3
207 # hc4 = [(m[60-63] >> 8) | (1<<24), (m[44-47] >> 8) | (1<<24),
208 # (m[28-31] >> 8) | (1<<24), (m[12-15] >> 8) | (1<<24) + h4]
211 vpunpcklqdq t1,hc4,hc4
215 vperm2i128 $0x20,t1,hc4,hc4
217 vpor ORMASK(%rip),hc4,hc4
221 # t1 = [ hc0[3] * r0, hc0[2] * u0, hc0[1] * w0, hc0[0] * y0 ]
222 vpmuludq hc0,ruwy0,t1
223 # t1 += [ hc1[3] * s4, hc1[2] * v4, hc1[1] * x4, hc1[0] * z4 ]
224 vpmuludq hc1,svxz4,t2
226 # t1 += [ hc2[3] * s3, hc2[2] * v3, hc2[1] * x3, hc2[0] * z3 ]
227 vpmuludq hc2,svxz3,t2
229 # t1 += [ hc3[3] * s2, hc3[2] * v2, hc3[1] * x2, hc3[0] * z2 ]
230 vpmuludq hc3,svxz2,t2
232 # t1 += [ hc4[3] * s1, hc4[2] * v1, hc4[1] * x1, hc4[0] * z1 ]
233 vpmuludq hc4,svxz1,t2
235 # d0 = t1[0] + t1[1] + t[2] + t[3]
242 # t1 = [ hc0[3] * r1, hc0[2] * u1,hc0[1] * w1, hc0[0] * y1 ]
243 vpmuludq hc0,ruwy1,t1
244 # t1 += [ hc1[3] * r0, hc1[2] * u0, hc1[1] * w0, hc1[0] * y0 ]
245 vpmuludq hc1,ruwy0,t2
247 # t1 += [ hc2[3] * s4, hc2[2] * v4, hc2[1] * x4, hc2[0] * z4 ]
248 vpmuludq hc2,svxz4,t2
250 # t1 += [ hc3[3] * s3, hc3[2] * v3, hc3[1] * x3, hc3[0] * z3 ]
251 vpmuludq hc3,svxz3,t2
253 # t1 += [ hc4[3] * s2, hc4[2] * v2, hc4[1] * x2, hc4[0] * z2 ]
254 vpmuludq hc4,svxz2,t2
256 # d1 = t1[0] + t1[1] + t1[3] + t1[4]
263 # t1 = [ hc0[3] * r2, hc0[2] * u2, hc0[1] * w2, hc0[0] * y2 ]
264 vpmuludq hc0,ruwy2,t1
265 # t1 += [ hc1[3] * r1, hc1[2] * u1, hc1[1] * w1, hc1[0] * y1 ]
266 vpmuludq hc1,ruwy1,t2
268 # t1 += [ hc2[3] * r0, hc2[2] * u0, hc2[1] * w0, hc2[0] * y0 ]
269 vpmuludq hc2,ruwy0,t2
271 # t1 += [ hc3[3] * s4, hc3[2] * v4, hc3[1] * x4, hc3[0] * z4 ]
272 vpmuludq hc3,svxz4,t2
274 # t1 += [ hc4[3] * s3, hc4[2] * v3, hc4[1] * x3, hc4[0] * z3 ]
275 vpmuludq hc4,svxz3,t2
277 # d2 = t1[0] + t1[1] + t1[2] + t1[3]
284 # t1 = [ hc0[3] * r3, hc0[2] * u3, hc0[1] * w3, hc0[0] * y3 ]
285 vpmuludq hc0,ruwy3,t1
286 # t1 += [ hc1[3] * r2, hc1[2] * u2, hc1[1] * w2, hc1[0] * y2 ]
287 vpmuludq hc1,ruwy2,t2
289 # t1 += [ hc2[3] * r1, hc2[2] * u1, hc2[1] * w1, hc2[0] * y1 ]
290 vpmuludq hc2,ruwy1,t2
292 # t1 += [ hc3[3] * r0, hc3[2] * u0, hc3[1] * w0, hc3[0] * y0 ]
293 vpmuludq hc3,ruwy0,t2
295 # t1 += [ hc4[3] * s4, hc4[2] * v4, hc4[1] * x4, hc4[0] * z4 ]
296 vpmuludq hc4,svxz4,t2
298 # d3 = t1[0] + t1[1] + t1[2] + t1[3]
305 # t1 = [ hc0[3] * r4, hc0[2] * u4, hc0[1] * w4, hc0[0] * y4 ]
306 vpmuludq hc0,ruwy4,t1
307 # t1 += [ hc1[3] * r3, hc1[2] * u3, hc1[1] * w3, hc1[0] * y3 ]
308 vpmuludq hc1,ruwy3,t2
310 # t1 += [ hc2[3] * r2, hc2[2] * u2, hc2[1] * w2, hc2[0] * y2 ]
311 vpmuludq hc2,ruwy2,t2
313 # t1 += [ hc3[3] * r1, hc3[2] * u1, hc3[1] * w1, hc3[0] * y1 ]
314 vpmuludq hc3,ruwy1,t2
316 # t1 += [ hc4[3] * r0, hc4[2] * u0, hc4[1] * w0, hc4[0] * y0 ]
317 vpmuludq hc4,ruwy0,t2
319 # d4 = t1[0] + t1[1] + t1[2] + t1[3]
326 # Now do a partial reduction mod (2^130)-5, carrying h0 -> h1 -> h2 ->
327 # h3 -> h4 -> h0 -> h1 to get h0,h2,h3,h4 < 2^26 and h1 < 2^26 + a small
328 # amount. Careful: we must not assume the carry bits 'd0 >> 26',
329 # 'd1 >> 26', 'd2 >> 26', 'd3 >> 26', and '(d4 >> 26) * 5' fit in 32-bit
330 # integers. It's true in a single-block implementation, but not here.
336 # h0 = d0 & 0x3ffffff
344 # h1 = d1 & 0x3ffffff
353 # h2 = d2 & 0x3ffffff
362 # h3 = d3 & 0x3ffffff
367 # h0 += (d4 >> 26) * 5
370 lea (%rax,%rax,4),%rax
372 # h4 = d4 & 0x3ffffff
381 # h0 = h0 & 0x3ffffff
394 ENDPROC(poly1305_4block_avx2)